亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

ON-THE-<b>Go</b>

  • VxWorks 6.6 BSP開發執導 This document describes, in general terms, the elements that make up a board

    VxWorks 6.6 BSP開發執導 This document describes, in general terms, the elements that make up a board support package [BSP], the requirements for a VxWorks BSP, and the general behavior of a BSP during the boot process. This document outlines the steps needed to port an existing BSP to a new hardware platform or to write a new VxWorks BSP for custom hardware using a reference BSP or template BSP as a starting point. It provides hints and tips for debugging a BSP and solving common BSP development problems. It also provides information on the BSP validation test suite [BSP VTS] that is used to assess the functionality of a VxWorks BSP.

    標簽: describes document elements VxWorks

    上傳時間: 2017-03-23

    上傳用戶:磊子226

  • For the practicing programmer with little time to spare, Essential C++ offers a fast-track to learn

    For the practicing programmer with little time to spare, Essential C++ offers a fast-track to learning and working with C++ on the job. This book is specifically designed to bring you up to speed in a short amount of time. It focuses on the elements of C++ programming that you are most likely to encounter and examines features and techniques that help solve real-world programming challenges.

    標簽: practicing fast-track programmer Essential

    上傳時間: 2017-03-29

    上傳用戶:洛木卓

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    標簽: cylindrical scattering expansion developed

    上傳時間: 2017-03-30

    上傳用戶:lhc9102

  • We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicit

    We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity along a line joining the origin of the cloak is a constant, while the velocity approaches zero at the inner boundary of the cloak. A ray pointing right into the origin of the cloak will experience abrupt changes of velocities when it impinges on the inner surface of the cloak. This peculiar distribution causes long time delays for beams passing through the ideal cloak within a geometric optics description.

    標簽: distribution dimensional transport obtained

    上傳時間: 2013-12-19

    上傳用戶:zhliu007

  • Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

    Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.

    標簽: the resource Netcat Swiss

    上傳時間: 2017-04-02

    上傳用戶:onewq

  • In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights o

    In some graphs, the shortest path is given by optimizing two different metrics: the sum of weights of the edges and the number of edges. For example: if two paths with equal cost exist then, the path with the least number of edges is chosen as the shortest path. Given this metric, you have find out the shortest path between a given pair of vertices in the input graph. The output should be the number of edges on the path, the cost of the shortest path, and the path itself. Input is the adjacency matrix and the two vertices.

    標簽: optimizing different the shortest

    上傳時間: 2014-10-25

    上傳用戶:1159797854

  • full wave rectifierDuring the period from 偽 to 蟺, the input voltage vs input current is are positive

    full wave rectifierDuring the period from 偽 to 蟺, the input voltage vs input current is are positive and the power flows from supply to the load. The converter is said to be operated at rectification mode .During the period from 蟺 to 蟺+偽 , the input voltage vs is negative and the input current is is positive and reverse power flows from load to the supply. The converter is said to be operated in inversion mode. Depending on the value of 偽, average output voltage can be either positive or negative and hence provides 2 quadrant operation.

    標簽: input rectifierDuring the positive

    上傳時間: 2017-04-10

    上傳用戶:alan-ee

  • The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and da

    The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and data bus (DRAM) with a bandwidth of about 200kbit/s  examining the processor state whatever the execution mode (monice)  connecting to monice using mdi-server and using a gdb client on the processor to step and break accurately whatever the execution mode  running semi-hosted applications  fl ash write tool  memory testing (MT command)  real-time traces: has not been built in CPU (Config3_TL=0) and only supported by MajicPLUS probes (maybe built into emulator?)

    標簽: interface processor allowing access

    上傳時間: 2013-12-19

    上傳用戶:youke111

  • Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world.

    Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world. A command can be send by mobile phone through sms.Based on the command ur pc performs tasks such as shut down,open file,play music etc.

    標簽: your Phone-it controls anywhere

    上傳時間: 2017-04-13

    上傳用戶:四只眼

  • There are _NO_ standard sample rate for the samples used in modules. But most often the samples are

    There are _NO_ standard sample rate for the samples used in modules. But most often the samples are done on the rate called C-3 (which is about 16574 Hz if you have a PAL machine). Sometimes drums are sampled at A-3 (around 28 kHz), and some sounds are at ~8 kHz or anything else to save space.

    標簽: samples are the standard

    上傳時間: 2017-04-14

    上傳用戶:稀世之寶039

主站蜘蛛池模板: 盐山县| 丁青县| 乌苏市| 镇平县| 云安县| 祁连县| 广昌县| 大庆市| 家居| 宁陵县| 永济市| 手游| 临泉县| 宁河县| 廊坊市| 莆田市| 大宁县| 彰化市| 宜宾县| 海南省| 云龙县| 高平市| 莱阳市| 突泉县| 楚雄市| 吉水县| 韩城市| 阳江市| 辉南县| 贺兰县| 清新县| 舞钢市| 武汉市| 绥中县| 兴宁市| 桐柏县| 特克斯县| 郴州市| 中方县| 广昌县| 通州区|